Protect your identity over internet. Don't let hackers to trace you and hack you.
Credits: Tahir Abbas,

Protect your identity over internet. Don't let hackers to trace you and hack you.

Your privacy matters a lot, while you're browsing, shopping, Login to bank accounts, share sensitive information over internet.


Hy my name is Tahir Abbas a Software Engineer; I realized people are no aware of what happened to their personal information when they are on network. But I realized when my data was stolen, personal information like, emails, passwords, mobile number, and even bank details as well. You don't know how is sniffing your data behind your OS, in network, etc. Today am more interested in cybersecurity, I figured it out and am here to educate you, so you can protect yourself, your data, because.

In my opinion we people have two worlds, one is your earth. Your physical presence but the second one is your virtual/digital presence of data, information. People are living in two worlds, but they didn't realize it.

Can you protect your data 100% on internet?

Well, no one is 100% sure that their sensitive data is protected but, at-least you can try to protect your information, hide your footsteps on internet. The sharks in Tech world are not even protected 100%, they are still afraid what if our user's data will steal in the middle of night. Yes, am talking about sharks, #Google, #Microsoft, #NASA, #Military sensitive missions regarding technology.

Don't worry we still have hope to protect ourselves on internet.

No alt text provided for this image
Task & purpose, Military keeps Growing in cybersecurity



How can you protect your sensitive information over internet?

Don't worry I know the right answer. You can use secure browser which cannot keep your logs. But, not at all, this is not enough is 2023, you should use a secure operating system as well. I personally love #Linux (Kali). Never use #windows, it keeps your logs, always use Linux.

Chose right VPN.

You can use a trusted VPN as well, to make sure your #ISP cannot steal your information. Now the question is ISP can steal our data? Yes. they do. Be aware of ISP frauds as well. But VPN is not for this little purpose, it has a lot of many benefits as well. Make sure use #ProtonVPN which is secure, and they are not interested in your logs.

No alt text provided for this image
Proton VPN (Free)


Select right operating system for you.

Now, this part is interesting, this is 2023 and we people are not fool, we should protect ourselves in our second world as well. A little mistake can cost you a lot believe me.

No alt text provided for this image
Tails Operating System


TAILS, Tails is a portable operating system that helps protect against #surveillance and censorship by using the Tor network to protect your privacy online and help you avoid #censorship. It includes a unique variety of software that handles the encryption of files and internet transmissions, #cryptographic signing and #hashing, and other functions important to #security. Tails also includes a selection of applications to work on sensitive documents and communicate securely. All the applications are ready-to-use and are configured with safe defaults to prevent mistakes.

It is not necessary, to use VPN like proton when you are already using Tor Routing, which is impossible to trace someone. Thats why #GOVT #agencies use Tor-Routing, hackers love Tor-Routing, #Darkweb market's etc.

Using Tor is not illegal but using it to sell illegal goods on Dark web is a crime. I hope you are not here to do so.

Tails will help you to keep your data encrypted over internet, even if you will download anything from Tor into your OS(Tails) after you pull out your tails USB it will wipe your data automatically. Thats why experts trust tails.



Tor

#Tor is a package that uses onion routing to provide #anonymous and secure communication over a public network. Onion routing involves #encrypting data multiple times and passing it through a network of volunteer-run servers (or 'relays') from around the world. Tor creates a twisted path through 3 Tor nodes and sends the data via that circuit. Using Tor's software will make it difficult, if not impossible, for any snoops to see your webmail, search history, social media posts or other online activity.

No alt text provided for this image
Tor




That's it.

Now you are ready to browse securely over internet. Go to the official Tails website to download Tails and make sure read their installation guides first. In case of any problem let know, I will publish another article on it.

Later we will talk about what is hashing, Tor Network, cryptographic signing.

Nabila Abbas

Founder RDI " Rural Development Initiatives"| Youth Member | Prime Minister's National Youth Council | Board Member @Kectil

1 年

Very informative. Thank you for sharing this.

要查看或添加评论,请登录

Tahir Abbas ??的更多文章

  • How to be Invisible Online.

    How to be Invisible Online.

    The Hard truth behind how to be invisible online. The current population of world is around 8 billion.

    4 条评论

社区洞察

其他会员也浏览了